Brick (electronics)
Encyclopedia
When used in reference to consumer electronics
Consumer electronics
Consumer electronics are electronic equipment intended for everyday use, most often in entertainment, communications and office productivity. Radio broadcasting in the early 20th century brought the first major consumer product, the broadcast receiver...

, "brick" describes a device that cannot function in any capacity (such as a device with damaged firmware
Firmware
In electronic systems and computing, firmware is a term often used to denote the fixed, usually rather small, programs and/or data structures that internally control various electronic devices...

). This usage derives from the fact that some electronic devices (and their detachable power supplies
Power supply
A power supply is a device that supplies electrical energy to one or more electric loads. The term is most commonly applied to devices that convert one form of electrical energy to another, though it may also refer to devices that convert another form of energy to electrical energy...

) are vaguely brick-shaped, and so those which do not function are useful only as actual bricks
Brick
A brick is a block of ceramic material used in masonry construction, usually laid using various kinds of mortar. It has been regarded as one of the longest lasting and strongest building materials used throughout history.-History:...

. The term can also be used as a verb. For example, "I bricked my MP3 player when I tried to modify its firmware."

In the strictest sense of the term, bricking must imply that software error has rendered the device completely unrecoverable without some hardware replacement. However, it is common to use the term for a problem which can be rectified but only by a complex and difficult procedure, often requiring additional software and hardware.

Cause and Prevention

Bricking a device is usually an unwanted consequence of an attempt to update the device. Many devices have an update procedure which must not be interrupted; if interrupted by a power failure, user intervention, or any other reason the existing firmware may be partially overwritten and unusable. The risk of corruption can be minimized by taking all possible precautions against interruption.

Installing incorrect firmware
Firmware
In electronic systems and computing, firmware is a term often used to denote the fixed, usually rather small, programs and/or data structures that internally control various electronic devices...

 can also brick a device, e.g., installing firmware for a different revision of the hardware, or installing firmware incompetently patched by certain developers to get around restrictions imposed by official firmware, such as DVD firmware which only plays DVDs sold in a particular region. Most updating software makes all possible checks that firmware is valid for the device, but this cannot be relied upon.

Devices can also be bricked by malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

 (malicious software), and sometimes by running software not intentionally harmful but with errors which cause damage.

Some devices include two copies of firmware, one active and the other stored in fixed ROM
Read-only memory
Read-only memory is a class of storage medium used in computers and other electronic devices. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty, so it is mainly used to distribute firmware .In its strictest sense, ROM refers only...

 or writable non-volatile memory
Non-volatile memory
Non-volatile memory, nonvolatile memory, NVM or non-volatile storage, in the most basic sense, is computer memory that can retain the stored information even when not powered. Examples of non-volatile memory include read-only memory, flash memory, ferroelectric RAM, most types of magnetic computer...

 and not normally accessible to processes that could corrupt it, and a way to copy the stored firmware over the active version even if corrupt, so that if the active firmware is damaged it can be replaced by the copy and the device will not be bricked. Other devices have minimal "bootloader" firmware, enabled usually by operating a switch
Switch
In electronics, a switch is an electrical component that can break an electrical circuit, interrupting the current or diverting it from one conductor to another....

 or jumper
Jumper (computing)
In electronics and particularly computing, a jumper is a short length of conductor used to close a break in or bypass part of an electrical circuit...

, which does not enable the device to work normally but can reload the main firmware.

Unbricking

Some devices which are "bricked" because the contents of their nonvolatile memory are incorrect can be "unbricked" using separate hardware (a debug board) that accesses this memory directly. This is similar to the procedure for loading firmware into a new device when the memory is still empty. This kind of "bricking" and "unbricking" occasionally happens during firmware testing and development. In other cases software and hardware procedures, often complex, have been developed that have a good chance of unbricking the device. There is no general method; each device is different. There are also user-created modifier programs to use on bricked or partially bricked devices to make them functional. Examples include the Wiibrew program BootMii used to fix semi-bricked Nintendo Wii's or ClockworkMod on various Android devices.

Systems

In principle any device with rewriteable firmware can be bricked. Many, but not all, devices with user-updateable firmware have protection against bricking; devices intended to be updated only by official service personnel generally do not.

Amongst devices known to have bricking issues are: older PCs (more recent models often have dual BIOS
BIOS
In IBM PC compatible computers, the basic input/output system , also known as the System BIOS or ROM BIOS , is a de facto standard defining a firmware interface....

es or some other form of protection), many mobile phone
Mobile phone
A mobile phone is a device which can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile network operator...

s, handheld game console
Handheld game console
A handheld game console is a lightweight, portable electronic device with a built-in screen, game controls and speakers. Handheld game consoles are run on machines of small size allowing people to carry them and play them at any time or place...

s like the PlayStation Portable
PlayStation Portable
The is a handheld game console manufactured and marketed by Sony Corporation Development of the console was announced during E3 2003, and it was unveiled on , 2004, at a Sony press conference before E3 2004...

 and Nintendo DS
Nintendo DS
The is a portable game console produced by Nintendo, first released on November 21, 2004. A distinctive feature of the system is the presence of two separate LCD screens, the lower of which is a touchscreen, encompassed within a clamshell design, similar to the Game Boy Advance SP...

, video game console
Video game console
A video game console is an interactive entertainment computer or customized computer system that produces a video display signal which can be used with a display device to display a video game...

s like the Nintendo Wii, Xbox 360
Xbox 360
The Xbox 360 is the second video game console produced by Microsoft and the successor to the Xbox. The Xbox 360 competes with Sony's PlayStation 3 and Nintendo's Wii as part of the seventh generation of video game consoles...

 and PlayStation 3
PlayStation 3
The is the third home video game console produced by Sony Computer Entertainment and the successor to the PlayStation 2 as part of the PlayStation series. The PlayStation 3 competes with Microsoft's Xbox 360 and Nintendo's Wii as part of the seventh generation of video game consoles...

, many SCSI
SCSI
Small Computer System Interface is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols, and electrical and optical interfaces. SCSI is most commonly used for hard disks and tape drives, but it...

 devices and some lines of hard disk drives and routers.

Online and mobile services

Many newer systems capable of accessing online services (such as the Xbox
Xbox
The Xbox is a sixth-generation video game console manufactured by Microsoft. It was released on November 15, 2001 in North America, February 22, 2002 in Japan, and March 14, 2002 in Australia and Europe and is the predecessor to the Xbox 360. It was Microsoft's first foray into the gaming console...

, Xbox 360
Xbox 360
The Xbox 360 is the second video game console produced by Microsoft and the successor to the Xbox. The Xbox 360 competes with Sony's PlayStation 3 and Nintendo's Wii as part of the seventh generation of video game consoles...

, PlayStation 3
PlayStation 3
The is the third home video game console produced by Sony Computer Entertainment and the successor to the PlayStation 2 as part of the PlayStation series. The PlayStation 3 competes with Microsoft's Xbox 360 and Nintendo's Wii as part of the seventh generation of video game consoles...

, and iPhone
IPhone
The iPhone is a line of Internet and multimedia-enabled smartphones marketed by Apple Inc. The first iPhone was unveiled by Steve Jobs, then CEO of Apple, on January 9, 2007, and released on June 29, 2007...

) have internal hardware-based unique identifiers, allowing individual systems to be tracked over a network and banned from accessing certain online services. Such systems usually continue to operate for purposes unrelated to the online service, but they are often considered "bricked" by users of the online service.

Mobile telephones have a fixed identification code, the IMEI; a telephone reported stolen can have its IMEI blocked by networks
Cellular network
A cellular network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver known as a cell site or base station. When joined together these cells provide radio coverage over a wide geographic area...

—effectively bricked—although anyone with the necessary expertise and equipment can usually change the IMEI. In 2011 a United States Senator proposed that phones be "bricked" when reported stolen.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK